Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
45644 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
1.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
2.
Calculating malware severity rating using threat tree analysis
by Malhotra, Asheer, M.S.  Mississippi State University. 2015: 338 pages; 1586986.
4.
5.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
6.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
7.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
8.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
9.
Detection of malware via side channel information
by Quinn, Rian, Ph.D.  State University of New York at Binghamton. 2012: 169 pages; 3522519.
10.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
11.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
12.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
13.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
14.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
15.
Deep Dynamic Analysis of Android Applications
by Gustafson, Eric David, M.S.  University of California, Davis. 2014: 48 pages; 1565669.
16.
Elicitation of a Program's Behaviors
by Miles, Craig S., Ph.D.  University of Louisiana at Lafayette. 2015: 134 pages; 10002454.
18.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
20.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
21.
Detecting Fine-Grained Similarity in Binaries
by Saebjornsen, Andreas, Ph.D.  University of California, Davis. 2014: 107 pages; 3646391.
22.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
23.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
24.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
25.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
26.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
27.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
28.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
29.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
1 - 30 of 45644 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest